首页> 外文会议>Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks >4th workshop on recent advances in intrusion-tolerant systems WRAITS 2010
【24h】

4th workshop on recent advances in intrusion-tolerant systems WRAITS 2010

机译:第四届研讨会,介绍入侵防护系统的最新进展WRAITS 2010

获取原文

摘要

Design and operational vulnerabilities are accepted as inevitable in today's complex computer systems. The distributed and networked nature of the systems that are currently in use and being developed facilitate discovery and exploitation of these flaws in increasingly new and easier ways. Intrusion Tolerance acknowledges that it is impossible to completely prevent attacks and intrusions, and that it is often impossible to accurately detect the act of intrusion and stop it early enough. Intrusion Tolerance research therefore aims to develop technologies that enable computer systems to continue to operate correctly despite attacks, and deny the attacker/intruder the success they seek. For instance, an intrusion-tolerant system may suffer partial loss of service or resources due to the attack, but it will continue to provide critical services in a degraded mode or trigger automatic mechanisms to regain and recover the compromised services and resources. Similar goals are being pursued in Survivability, Byzantine Fault Tolerance, Self-regenerative and Autonomic Systems.
机译:在当今复杂的计算机系统中,不可避免地存在设计和操作漏洞。当前正在使用和正在开发的系统的分布式和联网性质,以越来越新颖和更容易的方式促进了对这些缺陷的发现和利用。入侵容忍度承认不可能完全阻止攻击和入侵,并且通常不可能准确地检测到入侵行为并尽早将其阻止。因此,入侵容忍研究旨在开发使计算机系统即使受到攻击仍能继续正确运行的技术,并拒绝攻击者/入侵者寻求成功。例如,由于攻击,容忍入侵的系统可能会遭受部分服务或资源损失,但是它将继续以降级模式提供关键服务,或者触发自动机制来重新获得和恢复受损的服务和资源。在生存能力,拜占庭容错,自再生和自治系统中也追求类似的目标。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号